# error.log 分析
日志位置:/var/log/nginx
## 横向
```
2018/10/13 14:21:20 [warn] 1787#1787: *7557 an upstream response is buffered to a temporary file /var/cache/nginx/fastcgi_temp/2/00/0000000002 while reading upstream, client: 223.11.19.15, server: tmc.sxctkj.cc, request: "GET /phpinfo.php HTTP/1.1", upstream: "fastcgi://127.0.0.1:9000", host: "tmc.sxctkj.cc"
```
## 纵向
| 记录 | 说明 |
| ------------ | ------------ |
| 2018/10/13 14:21:20 | 访问时间 |
| [warn] | 报警 |
| 1787#1787: *7557 an upstream response is buffered to a temporary file /var/cache/nginx/fastcgi_temp/2/00/0000000002 while reading upstream, | 不知道 |
| client: 223.11.19.15, | 客户端IP |
| server: tmc.xxctkj.cc, | 服务端访问地址 |
| request: "GET /phpinfo.php HTTP/1.1", | 访问的文件 |
| upstream: "fastcgi://127.0.0.1:9000", | fastcgi上游 |
| host: "tmc.sxctkj.cc" | 域名 |
## 相关
https://www.cnblogs.com/aoniboy/p/4866395.html
| 错误信息 | 错误说明 |
| --- | --- |
| "upstream prematurely(过早的) closed connection" | 请求uri的时候出现的异常,是由于upstream还未返回应答给用户时用户断掉连接造成的,对系统没有影响,可以忽略 |
| "recv() failed (104: Connection reset by peer)" | (1)服务器的并发连接数超过了其承载量,服务器会将其中一些连接Down掉; (2)客户关掉了浏览器,而服务器还在给客户端发送数据;
(3)浏览器端按了Stop |
| "(111: Connection refused) while connecting to upstream" | 用户在连接时,若遇到后端upstream挂掉或者不通,会收到该错误 |
| "(111: Connection refused) while reading response header from upstream" | 用户在连接成功后读取数据时,若遇到后端upstream挂掉或者不通,会收到该错误 |
| "(111: Connection refused) while sending request to upstream" | Nginx和upstream连接成功后发送数据时,若遇到后端upstream挂掉或者不通,会收到该错误 |
| "(110: Connection timed out) while connecting to upstream" | nginx连接后面的upstream时超时 |
| "(110: Connection timed out) while reading upstream" | nginx读取来自upstream的响应时超时 |
| "(110: Connection timed out) while reading response header from upstream" | nginx读取来自upstream的响应头时超时 |
| "(110: Connection timed out) while reading upstream" | nginx读取来自upstream的响应时超时 |
| "(104: Connection reset by peer) while connecting to upstream" | upstream发送了RST,将连接重置 |
| "upstream sent invalid header while reading response header from upstream" | upstream发送的响应头无效 |
| "upstream sent no valid HTTP/1.0 header while reading response header from upstream" | upstream发送的响应头无效 |
| "client intended to send too large body" | 用于设置允许接受的客户端请求内容的最大值,默认值是1M,client发送的body超过了设置值 |
| "reopening logs" | 用户发送kill -USR1命令 |
| "gracefully shutting down", | 用户发送kill -WINCH命令 |
| "no servers are inside upstream" | upstream下未配置server |
| "no live upstreams while connecting to upstream" | upstream下的server全都挂了 |
| "SSL_do_handshake() failed" | SSL握手失败 |
| "SSL_write() failed (SSL:) while sending to client" | |
| "(13: Permission denied) while reading upstream" | |
| "(98: Address already in use) while connecting to upstream" | |
| "(99: Cannot assign requested address) while connecting to upstream" | |
| "ngx_slab_alloc() failed: no memory in SSL session shared cache" | ssl_session_cache大小不够等原因造成 |
| "could not add new SSL session to the session cache while SSL handshaking" | ssl_session_cache大小不够等原因造成 |
| "send() failed (111: Connection refused)" | |
- centos
- 安装工具
- 安装nginx
- 安装PHP5
- 安装PHP7.0.1
- 安装PHP7.0.8
- 安装redis
- redis允许远程访问
- 安装php之redis扩展
- 安装mysql
- 配置nginx虚拟机绑定域名
- xdebug下载配置
- phpStorm远程调试配置
- 报错解决:安装PHP7解决问题方法
- 报错解决:xdebug-解决问题
- yum丢失的解决办法
- CentOS下安装JDK的四种方法
- workman
- 某服务器配置情况
- 安装PHP7.2.17
- 安装PHP7.1.27
- 安装MongoDB
- ubuntu
- mac
- window
- phpstrom+wamp+xdebug
- mysql
- MySql创建本地用户和远程用户 并赋予权限
- 自建主从复制-mycat
- 数据库优化
- 阿里云mysql主从复制
- 报错解决
- SQL分析
- group by
- Mysql定时备份数据脚本
- MySQL数据库远程连接开启方法
- 启动报错systemctl status
- 日志导出
- mysq进程
- mysql查询正在执行的进程
- 命令
- nginx
- 安装GIT
- access.log
- error.log分析
- 500 Internal Server Error错误
- 502解决方案
- 405 Not Allowed,nginx静态文件响应post请求
- Linux基本操作
- 创建用户
- chmod命令详细用法设置文件的权限
- chown命令
- chgrp命令:改变文件的群组
- Linux 设置定时任务crontab命令
- 其他问题
- Win10 Subsystem Linux : Ubuntu 的root密码
- 安全问题
- PHP安全设置
- redis
- 安装
- 安装2.8.17
- 问题
- 日志分析
- an upstream response is buffered to a temporary file
- too many open files
- worker_connections are not enough
- recv() failed
- 日志
- 系统日志
- apache访问日志与错误日志
- nginx访问日志与错误日志
- php错误日志
- php-fpm慢日志
- mysql慢日志
- 服务器优化
- php-fpm进程数优化
- 服务器安全
- RHSA-2018:2748: kernel security and bug fix update
- RHSA-2018:3408: git security update
- RHSA-2018:2570: bind security update
- RHSA-2018:3052: wget security and bug fix update
- RHSA-2018:3221: openssl security, bug fix, and enhancement update
- RHSA-2018:2384: kernel security and bug fix update
- RHSA-2018:3032: binutils security, bug fix, and enhancement update
- RHSA-2018:3157: curl and nss-pem security and bug fix update
- RHSA-2018:2285: yum-utils security update
- RHSA-2018:3092: glibc security, bug fix, and enhancement update
- CVE-2018-17182 on Ubuntu 14.04 LTS (trusty)
- CVE-2018-9415 on Ubuntu 14.04 LTS (trusty)
- CVE-2018-8043 on Ubuntu 14.04 LTS (trusty)
- CVE-2018-3620 on Ubuntu 14.04 LTS (trusty)
- CVE-2018-14634 on Ubuntu 14.04 LTS (trusty)
- CVE-2018-14609 on Ubuntu 14.04 LTS (trusty)
- CentOS Linux 7安全基线检查
- Redis安全基线检查
- RHSA-2019:1168-重要: 内核 安全更新
- RHSA-2019:1481-重要: 内核 安全更新
- RHSA-2019:0512-重要: 内核 安全和BUG修复更新
- ThinkPHP漏洞
- ThinkPHP 5.1.X <= 5.1.30 远程代码执行漏洞
- ThinkPHP 5 <=5.0.22 远程代码执行高危漏洞
- ThinkPHP <5.0.24 Request.php 远程代码执行漏洞
- PHP
- 怎样获取PHP各种版本
- 攻击
- SSH暴力破解
- RDP暴力破解
- SQLSERVER暴力破解
- MYSQL暴力破解
- FTP暴力破解
- SQL注入
- 代码执行
- XSS攻击
- 本地文件包含
- 远程文件包含
- 脚本木马
- 上传漏洞
- 路径遍历
- 越权访问
- CSRF
- CRLF
- 其他